How receiver detects error, Computer Networking

Assignment Help:

How receiver detects error

The frame is 10011101. The generator is 1001. The message after appending the three zeros is 10011101000. The reminder on dividing 10011101000 by 1001 is 100. So, actual bit string transmitted is 10011101100. The arriving bit stream with an error in third bit from the left is 10111101100.Dividing this by 1001 produces remainder 100 that is different from zero. Therefore, the receiver detects error and can ask for a retransmission.

 


Related Discussions:- How receiver detects error

What is unbound transmission media, Unbound Transmission Media Unbound ...

Unbound Transmission Media Unbound transmission media extend beyond the limiting confines of cabling. They give a good communication alternative for WANS. The lack of physical

Receive window - transport layer, Receive Window This  field  defin...

Receive Window This  field  defines the size  of the  window in bytes  that the  other party  must  maintain. Note  that the  length  of this  field 16 bits  which  means

Show the masking process, Q. Show the Masking process? Masking ...

Q. Show the Masking process? Masking Take out the address of the physical network from an IP address Used by routers inside the organization

Illustrate data-link layer in osi layers model, Q. Illustrate Data-Link Lay...

Q. Illustrate Data-Link Layer in osi layers model? Data-Link Layer: This layer takes the data messages or frames from the Network Layer and gives for their actual transmissio

Advantages of bridges - network layer and routing, Advantages of Bridges ...

Advantages of Bridges By forwarding  frames  only to  the segment  where  host  resides  a bridge server the  following  purpose. a.Unwanted  traffic  as well  as network  c

Explain collision, When the signal hits to each other, collision accord.

When the signal hits to each other, collision accord.

What are diagrams and trigrams, What are Diagrams and Trigrams? The mos...

What are Diagrams and Trigrams? The most ordinary two letter combinations are known as diagrams. e.g. th, in, er, re and an. The most common three letter combinations are known

Give the description of security tools, Give the Description of security to...

Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is

Describe networking, Describe networking. Networking refers to the inte...

Describe networking. Networking refers to the inter connection among computers and peripherals for data communication. Networking can be done using wired cabling or by wireless

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd